Migration, Backup, Staging <= 0.9.123 - Unauthenticated Arbitrary File Upload
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.
CVE-2026-1357 is a critical severity with CVSS 9.8 Remote Code Execution issue affecting the Plugin WPvivid — Backup, Migration & Staging. It affects Versions up to 0.9.123 and is fixed in 0.9.124.
CVE-2026-1357 is tracked for the Plugin WPvivid — Backup, Migration & Staging as critical severity with CVSS 9.8. The affected range is Versions up to 0.9.123. Update WPvivid — Backup, Migration & Staging to 0.9.124 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
wpvivid-backuprestore
View on wordpress.org
|
| CVE | CVE-2026-1357 |
| Patched Versions |
0.9.124
|
| Affected Versions |
Versions up to 0.9.123
|
Related CVEs for WPvivid — Backup, Migration & Staging
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
WPvivid Backup and Migration <= 0.9.68 - Unauthenticated SQL Injection
Migration, Backup, Staging – WPvivid <= 0.9.107 - Unauthenticated PHP Object Injection
Migration, Backup, Staging – WPvivid <= 0.9.35 - Authenticated (Subscriber+) Arbitrary File Upload
Migration, Backup, Staging – WPvivid <= 0.9.89 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal
WPvivid Backup Plugin <= 0.9.90 - Missing Authorization via 'start_staging' and 'get_staging_progress'
Migration, Backup, Staging – WPvivid <= 0.9.91 - Google Drive Client Secret Exposure
Migration, Backup, Staging – WPvivid <= 0.9.105 - Sensitive Information Exposure
Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more